Cybersecurity - Tarun Chandna

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Challenges of Cybersecurity in

Digital Era

and

Possible Role of
Cybersecurity Consultants

By :
Tarun Chandna(200301023)
Cybersecurity

What is Cybersecurity Importance of Cybersecurity in today’s world

Cyber security is the practice of defending computers, servers, Cybersecurity is important because it protects all
mobile devices, electronic systems, networks, and data from categories of data from theft and damage.

malicious attacks. It can be divided into a few common Gone are the days of simple firewalls and antivirus
categories. software being your sole security measures. Business
leaders can no longer leave information security to
· Network security cybersecurity professionals.
· Application security
Cyber threats can come from any level of your
· Information security organization and we educate ourself about
· Operational security cybersecurity

· Disaster recovery and business continuity


· End-user education
Challenges of Cybersecurity in Digital Era

10 Biggest Challenges of Cyber Security

• Ransomware attacks
• IoT attacks
• Cloud attacks
• Phishing attacks
• Blockchain and cryptocurrency attacks
• Software vulnerabilities
• Machine learning and AI attacks
• BYOD policies
• Insider attacks
• Outdated hardware
RANSOMWARE ATTACKS

• India’s most prominent Cyber Security challenges.


• About 82% of Indian organizations were hit by
ransomware in the last six months.
• Ransomware attacks involve hacking into a user’s
data and preventing them from accessing it until
a ransom amount is paid.
IOT ATTACKS

• According to IoT Analytics, there will be about 11.6


billion IoT devices by the end of 2021.
• IoT devices can autonomously transmit data over a
network.
• Attacking IoT devices can result in the compromise of
sensitive user data.
• Safeguarding IoT devices is one of the biggest
challenges in Cyber Security, as gaining access to these
devices can open the doors for other malicious attacks.
CLOUD ATTACKS

Most of us today use cloud services for personal and


professional needs. Also, hacking cloud-platforms to
steal user data is one of the challenges in Cyber Security
for businesses. We are all aware of the infamous iCloud
hack, which exposed private photos of celebrities. If such
an attack is carried out on enterprise data, it could pose a
massive threat to the organization and maybe even lead
to its collapse.
PHISHING ATTACKS

Phishing is a type of social engineering attack


often used to steal user data, including login
credentials and credit card numbers.
EXAMPLE : ILLEGAL MONEY TRANSFER
BLOCKCHAIN AND CRYPTOCURRENCY ATTACKS

While blockchain and cryptocurrency might not mean


much to the average internet user, these technologies are
a huge deal for businesses. Thus, attacks on these
frameworks pose considerable challenges in Cyber
Security for businesses as it can compromise the customer
data and business operations. These technologies have
surpassed their infancy stage but have yet not reached an
advanced secure stage.
SOFTWARE VULNERABILITIES
Even the most advanced software has some vulnerability
that might pose significant challenges.

However, updating your device’s software with the latest


version should be a top priority.
MACHINE LEARNING AND AI ATTACKS
While Machine Learning and Artificial Intelligence
technologies have proven highly beneficial for massive
development in various sectors, it has its vulnerabilities as
well.

A sophisticated attack might prove to be too difficult to


handle due to the lack of Cyber Security expertise in India.
BYOD POLICIES
Most organizations have a Bring-Your-Own-Device policy
for their employees. Having such systems poses multiple
challenges in Cyber Security. Firstly, if the device is running
an outdated or pirated version of the software, it is already
an excellent medium for hackers to access.
INSIDER ATTACKS
While most challenges of Cyber Security are external for businesses, there can be instances of an inside job.
Example – MMT Account
OUTDATED HARDWARE
Well, don’t be surprised. Not all challenges of Cyber Security come in
the form of software attacks. With software developers realizing the
risk of software vulnerabilities, they offer a periodic update. However,
these new updates might not be compatible with the hardware of
the device.
POSSIBLE ROLE OF CYBERSECURITY CONSULTANTS

WHAT A CYBERSECURITY CONSULTANTS DO ? SKILLS REQUIRED


1. Education
A cybersecurity consultant doesn’t work for one
2. Certification
company exclusively, but rather is hired by a client to
3. Work Experience
test the organization’s cybersecurity measures, and then
4. Soft Skills
design and implement a better defense. These
5. Hard Skills
consultants are sometimes known by different names,
• Penetration Testing
such as:
• Ethical Hacking and Coding Practices
•Information security consultant
• Firewall Safety and Management
•Computer security consultant
• Operating Systems Knowledge
•Database security consultant
•Network security consultant
THE CYBERSECURITY CONSULTANT’S ROLES AND RESPONSIBILITIES

• Spread a Figure out the best way to defend devices.


• Awareness security concerns and issues
• Perform vulnerability testing much like a white hat hacker does.
• Security assessments
• Research current security standards
• Draw up cost estimates for any needed defense upgrades
• Plan, research, and design security architecture
• Deliver all test findings
• Provide professional supervision
• Define, implement, and maintain
• React and respond immediately to any security-related incidents,
• Follow up with the client for updating and upgrading

You might also like